|
Issue |
Title |
|
Vol 11, No 7 (2010) |
A Survey of Opinion Dynamics on the Internet |
Abstract
|
Yun Liu, Zhen-Jiang Zhang, Fei Ding, Xia-Meng Si, Hai-Feng Zhang |
|
Vol 12, No 6 (2011) |
A Survey of Pedagogical Functions of Intelligent Agents in Virtual Learning Environments |
Abstract
|
Mohamed Soliman, Christian Guetl |
|
Vol 21, No 2 (2020) |
A Survey of Pricing Aware Traffic Engineering in Cloud Computing |
Abstract
PDF
|
Xiaocui Sun, Xinran Zhuo, Zhijun Wang |
|
Vol 6, No 1 (2005) |
A Survey of Solutions for the Coverage Problems in Wireless Sensor Networks |
Abstract
|
Chi-Fu Huang, Yu-Chee Tseng |
|
Vol 24, No 5 (2023) |
A Survey on Cloud Model |
Abstract
|
Peng Sun, Ruizhe Zhang, Xiwei Qiu |
|
Vol 21, No 5 (2020) |
A Survey on Different Techniques for Biometric Template Protection |
Abstract
PDF
|
P Jayapriya, R. R. Manimegalai, R. Lakshmana Kumar, Seifedine Kadry, Sanghyun Seo |
|
Vol 18, No 3 (2017) |
A Survey on Multi-Criteria Decision Making Methods for Evaluating Cloud Computing Services |
Abstract
|
Abdullah M. Al-Faifi, Biao Song, Atif Alamri, Abdulhameed Alelaiwi, Yang Xiang |
|
Vol 22, No 4 (2021) |
A Systematic Literature Review of Blockchain Technology: Security Properties, Applications and Challenges |
Abstract
PDF
|
Tuan-Vinh Le, Chien-Lung Hsu |
|
Vol 14, No 4 (2013) |
A Thermal Minority Game-Based Distributed Resource Allocation Scheme with Time-Varying Channels |
Abstract
|
Jin Liu, Fu-Bao Zhou, Qian-Ping Wang, Zhi-Zhen Liang, Wei Chen |
|
Vol 22, No 2 (2021) |
A Threshold-based Image Recovery Scheme for Image Publishing |
Abstract
PDF
|
Zhen Wu, Yining Liu, Kim-Kwang Raymond Choo |
|
Vol 18, No 7 (2017) |
A Throughput-Efficient On-Demand Synchronous X-MAC Protocol for Wireless Sensor Networks |
Abstract
|
Ga-Young Kim, Jongsuk Ahn |
|
Vol 14, No 7 (2013) |
A Timeliness-Aware Retransmission Mechanism for Partially Reliable Transport Protocols to Enhance Performance of Multimedia Applications |
Abstract
|
Ching-Neng Lai, Yuan-Cheng Lai, Yen-Hung Chen, Jian-Wei Lin, Yu-Chin Szu |
|
Vol 19, No 1 (2018) |
A Tool for Access Control Policy Validation |
Abstract
PDF
|
Muhammad Aqib, Riaz Ahmed Shaikh |
|
Vol 14, No 7 (2013) |
A Traceable and Fair Transaction Mechanism for Digital Rights Management on P2P Networks |
Abstract
|
Yi-Ju Lin, Hung-Wen Yang, Chou-Chen Yang, Woei Lin |
|
Vol 14, No 3 (2013) |
A Transportation Control System for Urban Environments |
Abstract
|
Catalin Fratila, Ciprian Dobre, Florin Pop, Valentin Cristea |
|
Vol 18, No 2 (2017) |
A Tunable Bound of the Embedding Level for Reversible Data Hiding with Contrast Enhancement |
Abstract
|
Haishan Chen, Wien Hong, Jiangqun Ni, Junying Yuan |
|
Vol 19, No 3 (2018) |
A Two-Level Intelligent Web Caching Scheme with a Hybrid Extreme Learning Machine and Least Frequently Used |
Abstract
PDF
|
Phet Imtongkhum, Chakchai So-In, Surasak Sanguanpong, Songyut Phoemphon |
|
Vol 19, No 1 (2018) |
A Two-Stage Failover Mechanism for High Availability in Service Function Chaining |
Abstract
PDF
|
Hosung Baek, Haneul Ko, Gwangwoo Park, Sangheon Pack, Jiyoung Kwak |
|
Vol 5, No 4 (2004) |
A Two-Stream Approach for Priority Management and Adaptive Rate Control in Multimedia Applications |
Abstract
|
Longin Jan Latecki, Tao Jin, Jaiwant Mulik |
|
Vol 17, No 7 (2016) |
A Two-Tier Replication Framework and Its Consensus Protocol for Big Data Storage of Internet of Things |
Abstract
|
Fagui Liu, Yingyi Yang |
|
Vol 19, No 4 (2018) |
A Universal Quantum Key Distribution Simulation Method Towards Future Internet |
Abstract
PDF
|
Yan Peng, Bo Liu, Baokang Zhao, Chunqing Wu, Wanrong Yu |
|
Vol 15, No 3 (2014) |
A User-Friendly and Authenticatable Secret Image Sharing Scheme |
Abstract
|
Jung-San Lee, Chin-Chen Chang, Hsin-Yi Tsai |
|
Vol 25, No 2 (2024) |
A User-friendly Cloud-based Multi-agent Information System for Smart Energy-saving |
Abstract
|
Yi-Jen Su, Sheng-Yuan Yang |
|
Vol 15, No 2 (2014) |
A Valley-Free Shortest Path Algorithm and Its Application in Detecting Critical Links among Autonomous Systems |
Abstract
|
Wei Peng, Wen-Ping Deng, Yu-Jing Liu, Feng Zhao, Xiao-Feng Hu |
|
Vol 15, No 6 (2014) |
A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks |
Abstract
|
Ping Guo, Jin Wang, Xue Hua Geng, Chang Seob Kim, Jeong-Uk Kim |
|
426 - 450 of 2657 Items |
<< < 13 14 15 16 17 18 19 20 21 22 > >> |